Shuo Qiu

Learn More
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising(More)
In this paper, we address the problem of multi-party privacy-preserving matching (PPM) over the encrypted data. We firstly construct an efficient identity-based re-encryption scheme like ElGmal (IBR-ElGmal) using combined public keys, which not only ensures the privacy of the information during the transmission process but also holds perfect multiplicative(More)
A private set intersection (PSI) protocol enables two parties to privately compute the intersection of their inputs. Most of its previous versions are unilateral, that is, only one party can learn the intersection and the other learns nothing. Many applications require that both parties can obtain the final result. What's more, all of the previous PSI(More)
Computing similarity, especially Jaccard Similarity, between two datasets is a fundamental building block in big data analytics, and extensive applications including genome matching, plagiarism detection, social networking, etc. The increasing user privacy concerns over the release of has sensitive data have made it desirable and necessary for two users to(More)
The RBSE Journal is an annual publication that presents the research of students and teachers who have participated in the Teacher Enhancement program TLRBSE, " Teacher Leaders in Research Based Science " at the National Optical Astronomy Observatory in Tucson. This program, funded by the NSF, consists of a distance learning course and a summer workshop for(More)
  • 1